Incident Response

Leveraging Wargaming Principles for Cyberdefense Exercises
Wargames are an excellent way to ensure your cyberdefense plans are solid and your processes are current ...
Security Boulevard

Cyberattacks Increasingly Target APIs
Nearly three-quarters of organizations suffered three or more breaches involving APIs in past two years ...
Security Boulevard
![[AWS + D3 Smart SOAR] Unlocking Advanced Security Automation](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Automated Incident Response with AWS and Smart SOAR
Pierre Noujeim | | asset management, AWS EC2, AWS GuardDuty, AWS Integration, D3 Smart SOAR, Incident Response, Integration Guide, Playbooks, Security Automation, security operations, SOAR, threat detection
D3 Smart SOAR offers 12 out-of-the-box integrations with Amazon Web Services (AWS) products. These include: AWS CloudTrail AWS CloudWatch AWS EC2 AWS ECS AWS EKS AWS S3 AWS SQS AWS SSM AWS ...

Report Surfaces Root Causes of Cloud Security Issues
Palo Alto Networks found that half of the critical exposures discovered in cloud computing environments can be traced back to recently added or updated cloud services ...
Security Boulevard

Patch EVERYTHING: Widely Used ‘WebP’ Code has Critical Bug
Richi Jennings | | Buffer Overflow, buffer overflow attack, Buffer Overflow Vulnerabilities, buffer overflows, Chrome, Chromium, edge, Electron, Exploitable Vulnerabilities, Firefox, google, Heap Overflow, libwebp, Open Source and Software Supply Chain Risks, open source software supply chain, open source software supply chain security, opera, SB Blogwatch, secure software supply chain, slack, software supply chain, software supply chain hygiene, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Risks, thunderbird, WebP
WebP FAIL. Critical vuln in libwebp: Go get updates to Chrome, Firefox, Edge, Slack and more ...
Security Boulevard

Battling Cybercrime by Combining ASM With CTI
Organizations are increasingly turning to attack surface management (ASM) and cyberthreat intelligence (CTI) as essential components of their cybersecurity programs ...
Security Boulevard

What Happens in Vegas: MGM Resorts ‘Ransomware’ Attack
You’re welcome to it. Not happening in Vegas: 12 hotels and casinos—nor in many more elsewhere, neither ...
Security Boulevard

Cloud Threats Rise: Who’s Attacking and How They Get In
Knowing who the threat actors are, how they are getting into your cloud environment and where your vulnerabilities are is a starting point to improving cloud security ...
Security Boulevard

‘BLASTPASS’ iPhone Exploit — Apple Asleep at the Switch
Richi Jennings | | Apple, BLASTPASS, Citizen Lab, FaceTime, FaceTime bug, imessage, ios, iPhone, NSO, NSO Group, Pegasus, Pegasus Spyware, Privacy, SB Blogwatch
Zero click, zero day, zero clue: Yet another iOS zero-day lets NSO’s Pegasus “mercenary spyware” cause chaos ...
Security Boulevard

Orca Security Adds Generative AI Asset Search Tool
Michael Vizard | | asset discovery, cloud computing environments, Cloud Security, generative AI, Orca Security
Orca Security's generative AI tool lets cybersecurity teams discover what assets are running in their cloud computing environments ...
Security Boulevard